Www.jstor.org Certificate-based Authentication to JSTOR Spencer W. Thomas Dec 1, 2001.

Slides:



Advertisements
Similar presentations
Federated Access implementation: experience of AUCA Library - Kyrgyzstan 4 th -7 th June, 2008, Aberdeen, Scotland Sania Battalova, EIFL Country and FOSS.
Advertisements

Ted Koppel The Library Corporation
Authorisation Models for National Scale Services Alan Robiette Joint Information Systems Committee
Digital Certificate Operation in a Complex Environment Matthew J. Dovey Oxford University Computing Services.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
MyProxy: A Multi-Purpose Grid Authentication Service
Universities Rethink Publishing Sarah E. Thomas Cornell University Library October 20, 2006 Forum on Improving Access to Publicly Funded Research: Policy.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CREN-Mellon conference, December 1, 2001 University of Texas PKI Status.
JSTOR What to do with the print? On behalf of ULSA University Libraries of South Australia.
The 3-Legged Stool: How JSTOR Balances the Needs of Scholars, Librarians, and Publishers in Maintaining a Sustainable Not-For- Profit Enterprise ACRL/NY.
Preservation of e-journals at the Koninklijke Bibliotheek Hilde van Wijngaarden Digital Preservation Officer Koninklijke Bibliotheek/ National Library.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
Open Proxy Servers Kevin Guthrie ALA, January 2003.
Introduction to Implementing an Institutional Repository Delivered to Technical Services Staff Dr. John Archer Library University of Regina September 21,
Faculty Participation in Open Archives: A Discussion John Schumacher SUNY System Administration Office of Library and Information Services.
Graduate Catalog Automation & Publication Project Graduate Catalog Automation & Publication Project.
Michael Krot, Data Manager and David Yakimischak, CTO
E-journals: opportunities and challenges Bharati Banerjee.
Integrated... Interoperable... Institutional... Implementation... Institutional VLE - Library Integration at University of Ulster.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
AAI with simpleSAMLphp
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
GRID Centralized management of the Globus grid-mapfile Carlo Rocca INFN, Catania.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Practical Advice Morag Greig Advocacy William J Nixon Service Development DAEDALUS Workshop – 27 June 2005.
Librarian Perceptions of the Function of the Academic Library: Summer-Fall 2006 Kevin Guthrie Roger C. Schonfeld December 4, 2006.
Technology Choices for the JSTOR Online Archive Presented by Chang Feng Department of Computer Engineering and Computer Science, University of Missouri-Columbia,
Collection Management Strategies in a Digital Environment Cecily Johns CMI Project Director August 2001.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
One Platform, Two Stories. Willamette University Oregon State University.
1 1 Scholarly Publishing & Academic Resources Coalition an initiative of the Association of Research Libraries Institutional Repository.
Deposit of Electronic Publications in the Netherlands Johan Steenbakkers e-ICOLC Conference 2002.
Information Technology Services Blackboard Learn Course Content Retention Policy.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Holly Eggleston, UCSD Shibboleth and Library Resources InCommon Library/Shibboleth Project.
John Douglass, Developer Ron Hutchins, Dir. Engineering Herbert Baines, Dir. InfoSec.
Digital Preservation Ontario Consortium of University Libraries (OCUL) Caitlin Tillman OCUL IR Chair With notes from Kathy Scardellato, OCUL Executive.
Implementing an Institutional Repository: Part III 16 th North Carolina Serials Conference March 29, 2007 Resource Issues.
Uganda Scholarly Digital Library (USDL) Makerere University’s Institutional Repository By Margaret Nakiganda URL:
1 herbert van de sompel CS 502 Computing Methods for Digital Libraries Cornell University – Computer Science Herbert Van de Sompel
Digital repositories and scientific communication challenge Radovan Vrana Department of Information Sciences, Faculty of Humanities and Social Sciences,
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Holly Eggleston, UCSD Beyond the IP Address: Shibboleth and Electronic Resources InCommon Library/Shibboleth Project.
2003 © SWITCH Authentication and Authorisation Infrastructure - AAI Christoph Graf Project Leader AAI SWITCH.
Managing Access at the University of Oregon : a Case Study of Scholars’ Bank by Carol Hixson Head, Metadata and Digital Library Services
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
The Gutenberg-e Online History Project Changing Roles of players and implications for scholarly communication.
How to Implement an Institutional Repository: Part IV A NASIG 2006 Pre-Conference May 4, 2006 Policy Issues.
Using JSTOR November What is JSTOR?JSTOR 2.JSTOR demonstration −Searching JSTOR −Format of the journal content −Using a MyJSTOR account to organize.
A Shibboleth Target David Yakimischak Chief Technology Officer.
Leveraging the Expertise of our Staff and the Information Resources We Manage MIT Libraries Visiting Committee April 13, 2005.
Using JSTOR May What is JSTOR?JSTOR 2.JSTOR demonstration −Searching JSTOR −Format of the journal content −Linking to content on JSTOR 3.Help.
USER GUIDE TO BOOKS AT JSTOR November WHAT IS BOOKS AT JSTOR? Books at JSTOR is a program that offers ebooks from leading scholarly publishers,
The R EPOSITORY AS P UBLISHER OPPORTUNITIES AND CHALLENGES IN A DUAL ROLE BEN HOCKENBERRY SYSTEMS LIBRARIAN | ST. JOHN FISHER COLLEGE.
7-Mar-01D.P.Kelsey, User access, WP6, Amsterdam1 WP6: GRID mapfiles and Users access policy David Kelsey CLRC/RAL, UK
Cryptography and Network Security
Authentication and Access:
Dartmouth College Status Report
Open Proxy Servers Kevin Guthrie ALA, January 2003
JSTOR as a Shibboleth Target
Implementing an Institutional Repository: Part III
Presentation transcript:

Certificate-based Authentication to JSTOR Spencer W. Thomas Dec 1, 2001

What is JSTOR? A digital archive of academic journals. Our constituents are –Scholars –Libraries –Publishers Our mission is to –Improve access –Provide comprehensive and reliable archive –Preserve content –Reduce library costs –Help publishers and societies make transition to electronic publishing

Who has access to JSTOR? Individuals in the scholarly community have access to JSTOR through their affiliation with: –Academic and Research Institutions “faculty, students, staff and people physically present on campus” –Publisher Individual Access Programs

Authentication versus Authorization Cleanly separate (expensive) authentication from (cheap) authorization. Authentication = “who you are” Authorization = “what you can do” Authentication informs authorization. Authenticate once, authorize each request.

Current Authentication to JSTOR Users’ organizational affiliations (“site”) determine their access rights IP-based Scripted access –Remote access, publisher-mediated access Username/password –Individuals (maintained by publisher) –Sites w/o stable or distinguishable IP

Authorization to JSTOR Authentication produces “ticket” Ticket is user’s authorization to use JSTOR –Ticket stored as “cookie” or in URL –Ticket defines access rights –Ticket has defined lifetime

Certificates: Another Authentication Option Goal: provide a useful authentication option When IP-based access is impractical Mobile users Authentication can be transparent Certificate authentication happens upon entry to JSTOR, rest of JSTOR session is unchanged

JSTOR Certificate Pilot Implementation Object: get experience with cert-based auth Limited testing -- no “real users” yet Certificate Issuer maps to “site” Certs to be issued only to authorized users Supports “DLF” LDAP query protocol No support for revocation (yet) Available at

The Future of Authentication Not going to get easier. Certificates provide some hope –Mobile users –Reduce IP database maintenance –Potentially greater accountability

References –Terms & conditions, privacy policy, mission, etc. –Discussion of JSTOR authentication options (certificates section is generic at this point) –“DLF” query protocol for cert authentication.